Overview
- Description
- The Flat UI Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's flatbtn shortcode in version 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Source
- security@wordfence.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- security@wordfence.com
- CWE-79
Social media
- Hype score
- Not currently trending
🚨 CVE-2024-10014 (Published: 2024-10-18) - A high-severity vulnerability in the Flat UI Button plugin for WordPress. Affected versions are vulnerable to exploitation. 🛡️ Remediation: Update to the latest version immediately to secure your site. More info: https://t.co/YCaTJNKWm
@transilienceai
21 Oct 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-10014 The Flat UI Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's flatbtn shortcode in version 1.0 due to insufficient input sanit… https://t.co/xjiKa8IUIz
@CVEnew
456 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tiandiyoyo:flat_ui_button:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A95CF1DB-0CDE-43BD-AE7E-EC77B1D9F3E6" } ], "operator": "OR" } ] } ]